LockBit Operators Use Stealthy DLL Sideloading to Mask Malicious App as Legitimate One | #ransomware | #cybercrime


Operators of LockBit ransomware have improved their tactics, methods, and procedures (TTPs) to avoid detection and increase damage in the always changing world of cyberthreats.

By exploiting DLL sideloading and masquerading, these attackers disguise malicious activities within legitimate system processes, enabling persistence and seamless integration into compromised environments.

DLL sideloading tricks trusted applications into loading malicious libraries, while masquerading renames files and processes to mimic benign ones, making them indistinguishable from routine operations.

This approach not only leverages inherent system trusts but also complicates identification by security tools, as seen in recent campaigns where LockBit payloads were bundled with digitally signed executables.

Evolving Tactics in Ransomware Deployment

Operators initiate attacks by gaining initial access through remote desktop tools like MeshAgent or TeamViewer, uploading and executing files directly on target machines.

Recent LockBit attack chain

Privilege escalation follows, utilizing utilities such as NSSM to run remote access Trojans (RATs) as services often renamed to innocuous filenames like edge.exe.exe or o.exe and PsExec to spawn command prompts under SYSTEM privileges with commands like PsExec64.exe -s -i cmd.

Discovery phases involve tools like net.exe, nltest.exe, and query.exe to enumerate domain users, groups, trusts, and permissions, gathering intelligence for further infiltration.

Credential theft employs TokenUtils.exe to impersonate high-privilege tokens, such as NT AUTHORITY\SYSTEM, for executing commands, alongside Sd1.exe for extracting Kerberos tickets from domain controllers.

Lateral movement leverages Group Policy to distribute payloads across networks, including ransomware DLLs, masqueraded executables, and obfuscated PowerShell scripts that generate random keys, encrypt specific file types (e.g., PDFs, documents, images, and code files), and append extensions like .xlockxlock.

Impact is achieved through DLL sideloading examples: the legitimate jarsigner.exe loading a malicious jli.dll to deploy payloads; the renamed MpCmdRun.exe (as .exe) sideloaded with mpclient.dll containing LockBit code; and the disguised Clink_x86.exe paired with clink_dll_x86.dll for encryption.

Direct execution of ransomware binaries like encth.exe or dwa.exe further encrypts data, blending with system directories for camouflage.

Defensive Measures Amid LockBit’s Evolution

Another recent LockBit attack chain

LockBit, operated by the Syrphid group, has extorted up to $500 million since 2019, but 2024 disruptions, including the indictment of alleged leader Dimitry Khoroshev and the leak of the LockBit 3.0 builder, have democratized its use among unaffiliated actors.

According to the report, these TTPs, observed in targeted campaigns, underscore the need for robust defenses.

Symantec EDR detects anomalies via AI summaries, while Carbon Black alerts on behaviors like Ransom.LockBit, Heur.AdvML.B, and SONAR.Ransomware! g3.

Network protections flag TeamViewer and MeshAgent activities, with C&C domains categorized as high-risk malnets. Behavioral indicators include untrusted processes accessing LSASS or PSEXEC launching suspicious commands.

Organizations should prioritize endpoint detection, anomaly monitoring, and patch management to counter these stealthy methods, as similar techniques could deploy other malware beyond LockBit.

Indicators of Compromise (IOC)

Type Indicator Description
File SHA-256 f689ee9af94b00e9e3f0bb072b34caaf207f32dcb4f5782fc9ca351df9a06c97 Nssm.exe
File SHA-256 5ca8e1d001a2c3800afce017424ca471f3cba41f9089791074a9cb7591956430 Tokenutils.exe
File SHA-256 0201a6dbe62d35b81d7cd7d7a731612458644b5e3b1abe414b0ea86d3266ab03 sd1.exe
File SHA-256 1cd644b750884906b707419c8f40598c04f1402e4e93cbf4a33f3254846dc870 .exe (Masqueraded MpCmdRun.exe)
File SHA-256 edcf76600cd11ef7d6a5c319087041abc604e571239fe2dae4bca83688821a3a mpclient.dll
File SHA-256 011b31d7e12a2403507a71deb33335d0e81f626d08ff68575a298edac45df4cb access.exe (Masqueraded clink_x86.exe)
File SHA-256 4147589aa11732438751c2ecf3079fb94fa478a01ac4f08d024fb55f7ffb52f3 clink_dll_x86.dll
File SHA-256 10f1a789e515fdaf9c04e56b8a5330cfb1995825949e6db8c9eaba4ea9914c97 jarsigner.exe
File SHA-256 086567b46fca2a27d404d9b61bdb482394e1591dc13f1302b813bb2ddf5e54cf jli.dll
File SHA-256 6285d32a9491a0084da85a384a11e15e203badf67b1deed54155f02b7338b108 nxc.exe
File SHA-256 785e5aaecd9430451f4b0bad637658e6afeea1e722b3d0dd674cb6a11f4ce286 encth.exe, dwa.exe
File SHA-256 24480dbe306597da1ba393b6e30d542673066f98826cc07ac4b9033137f37dbf o.exe, edge.exe.exe
Network msupdate[.]updatemicfosoft[.]com C&C Domain

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!



Source link

.........................

National Cyber Security

FREE
VIEW